Vulnerability Description
Wikmd is a file based wiki that uses markdown. Prior to version 1.7.1, an attacker could capture user's session cookies or execute malicious Javascript when a victim edits a markdown file. Version 1.7.1 fixes this issue.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wikmd Project | Wikmd | < 1.7.1 |
Related Weaknesses (CWE)
References
- https://github.com/Linbreux/wikmd/commit/259412c47d64d5b85980f95345179fbf0592779PatchThird Party Advisory
- https://github.com/Linbreux/wikmd/security/advisories/GHSA-9m4m-6gqx-gfj3Third Party Advisory
- https://github.com/Linbreux/wikmd/commit/259412c47d64d5b85980f95345179fbf0592779PatchThird Party Advisory
- https://github.com/Linbreux/wikmd/security/advisories/GHSA-9m4m-6gqx-gfj3Third Party Advisory
FAQ
What is CVE-2022-36080?
CVE-2022-36080 is a vulnerability with a CVSS score of 6.1 (MEDIUM). Wikmd is a file based wiki that uses markdown. Prior to version 1.7.1, an attacker could capture user's session cookies or execute malicious Javascript when a victim edits a markdown file. Version 1.7...
How severe is CVE-2022-36080?
CVE-2022-36080 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-36080?
Check the references section above for vendor advisories and patch information. Affected products include: Wikmd Project Wikmd.